Common Threat Vectors

Common Threat Vectors

Assessment

Interactive Video

Computers

9th - 12th Grade

Hard

Created by

Jordan Macurak

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary method attackers use to compromise systems through messaging platforms?

Exploiting physical security weaknesses.

Sending malicious links or attachments via email or text messages.

Intercepting wireless network signals.

Using outdated operating system vulnerabilities.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which image file format is described as containing XML that can embed malicious code like JavaScript for attacks?

PNG

JPG

SVG

GIF

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following file types is explicitly mentioned as a potential carrier for malicious code?

JPEG images

Adobe PDF

MP3 audio

TXT documents

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one way a specially modified USB device can compromise a computer system?

It can physically destroy the hard drive.

It can act as a keyboard to execute commands.

It can emit electromagnetic interference.

It can block all external network connections.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common security vulnerability related to new devices or software installations?

Using outdated operating systems.

Leaving default usernames and passwords unchanged.

Having too many open service ports.

Not patching software regularly.